default search action
Maode Ma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j254]Junwei Liang, Muhammad Sadiq, Geng Yang, Kai Jiang, Tie Cai, Maode Ma:
Enhanced collaborative intrusion detection for industrial cyber-physical systems using permissioned blockchain and decentralized federated learning networks. Eng. Appl. Artif. Intell. 135: 108862 (2024) - [j253]Bing Li, Mingxuan Zheng, Maode Ma:
A Novel Security Scheme Supported by Certificateless Digital Signature and Blockchain in Named Data Networking. IET Inf. Secur. 2024: 1-21 (2024) - [j252]Bin Lian, Jialin Cui, Hongyuan Chen, Xianghong Zhao, Fuqun Wang, Kefei Chen, Maode Ma:
Trusted Location Sharing on Enhanced Privacy-Protection IoT Without Trusted Center. IEEE Internet Things J. 11(7): 12331-12345 (2024) - [j251]Cong Wang, Tong Zhou, Maode Ma, Yuwen Xiong, Xiankun Zhang, Chao Liu:
An efficient certificateless blockchain-enabled authentication scheme to secure producer mobility in named data networks. J. Netw. Comput. Appl. 232: 104007 (2024) - [j250]Qinglei Kong, Yifan Wang, Maode Ma, Xiaodong Qu, Haiyong Bao:
A secure location management scheme in an LEO-satellite network with dual-mobility. Peer Peer Netw. Appl. 17(5): 3146-3158 (2024) - [j249]Na Li, Maode Ma, Wang Hui:
ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of Things. Sensors 24(4): 1243 (2024) - [j248]Ronghao Ma, Jianhong Zhou, Maode Ma:
A Blockchain-Assisted Security Protocol for Group Handover of MTC Devices in 5G Wireless Networks. Sensors 24(7): 2331 (2024) - [j247]Qianmin Du, Jianhong Zhou, Maode Ma:
EAIA: An Efficient and Anonymous Identity-Authentication Scheme in 5G-V2V. Sensors 24(16): 5376 (2024) - [j246]Yongyang Lv, Ruitao Feng, Maode Ma, Manqing Zhu, Hanwei Wu, Xiaohong Li:
Reinventing Multi-User Authentication Security From Cross-Chain Perspective. IEEE Trans. Inf. Forensics Secur. 19: 8908-8923 (2024) - [j245]Siwei Li, Hui Zhang, Hui Shi, Maode Ma, Cong Wang:
A novel blockchain-enabled zero-trust-based authentication scheme in power IoT environments. J. Supercomput. 80(14): 20682-20714 (2024) - [j244]Qinglei Kong, Xiaodong Qu, Feng Yin, Rongxing Lu, Songnian Zhang, Maode Ma:
Achieving Privacy-Preserving Location Management in LEO-Satellite Integrated Vehicular Network With Dense Ground Stations. IEEE Trans. Veh. Technol. 73(4): 5616-5629 (2024) - [c156]Han Yu, Jianhong Zhou, Maode Ma:
Anonymous Batch Message Authentication Aided by Edge Servers in Industrial Internet of Thing. AIIoT 2024: 584-590 - [c155]Qianmin Du, Jianhong Zhou, Maode Ma:
EAIA: An Efficient and Anonymous Identity Authentication Protocol for V2V Communications in Internet of Vehicles. AIIoT 2024: 591-597 - [c154]Zhihao Shi, Yaozong Xu, Maode Ma, Yanan Zhang:
An EWMA-Based Mitigation Scheme Against Interest Flooding Attacks in Named Data Networks. ICIC (9) 2024: 158-167 - [c153]Yanan Zhang, Jingru Xing, Yaozong Xu, Maode Ma, Cong Wang:
DM-CIFA: Detection and Mitigation of Collusion Interesting Flooding Attacks in NDNs. ICIC (9) 2024: 257-266 - [c152]Yuwen Xiong, Cong Wang, Chuang Chen, Jiawen Xu, Maode Ma, Tong Zhou:
Design of a Blockchain-Based Trust Model for Detecting Cache Poisoning Attakcs in NDN. ICIC (10) 2024: 522-529 - [i7]Qianmin Du, Jianhong Zhou, Maode Ma:
EAIA: An Efficient and Anonymous Identity Authentication Scheme in 5G-V2V. CoRR abs/2406.04705 (2024) - 2023
- [j243]Xue Jun Li, Maode Ma, Yihan Sun:
An Adaptive Deep Learning Neural Network Model to Enhance Machine-Learning-Based Classifiers for Intrusion Detection in Smart Grids. Algorithms 16(6): 288 (2023) - [j242]Mengyao Li, Rongbo Zhu, Qianao Ding, Jun Wang, Shaohua Wan, Maode Ma:
Edge computing-enabled green multisource fusion indoor positioning algorithm based on adaptive particle filter. Clust. Comput. 26(1): 667-684 (2023) - [j241]Yunfan Huang, Maode Ma:
ILL-IDS: An incremental lifetime learning IDS for VANETs. Comput. Secur. 124: 102992 (2023) - [j240]Cong Wang, Peng Huo, Maode Ma, Tong Zhou, Yiying Zhang:
A provable secure and lightweight ECC-based authenticated key agreement scheme for edge computing infrastructure in smart grid. Computing 105(11): 2511-2537 (2023) - [j239]Rongbo Zhu, Ashiq Anjum, Hongxiang Li, Maode Ma:
Edge intelligence-enabled cyber-physical systems. Concurr. Comput. Pract. Exp. 35(13) (2023) - [j238]Cong Wang, Xiaohang Li, Maode Ma, Tong Zhou, Guangquan Xu, Naixue Xiong, Yiying Zhang:
PSAK: A provably secure authenticated key agreement scheme based on extended Chebyshev chaotic maps for smart grid environments. Trans. Emerg. Telecommun. Technol. 34(5) (2023) - [j237]Bing Li, Maode Ma:
An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking. J. Netw. Syst. Manag. 31(1): 13 (2023) - [j236]Yangxia Hu, Wenhuan Lu, Jianguo Wei, Junhai Xu, Maode Ma:
A watermark detection scheme based on non-parametric model applied to mute machine voice. Multim. Tools Appl. 82(29): 44763-44782 (2023) - [j235]Rongbo Zhu, Mengyao Li, Hao Liu, Lu Liu, Maode Ma:
Federated Deep Reinforcement Learning-Based Spectrum Access Algorithm With Warranty Contract in Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(1): 1178-1190 (2023) - [j234]Xiaobei Yan, Maode Ma, Rong Su:
Efficient Group Handover Authentication for Secure 5G-Based Communications in Platoons. IEEE Trans. Intell. Transp. Syst. 24(3): 3104-3116 (2023) - [j233]Xuan-Son Vu, Maode Ma, Monowar H. Bhuyan:
MetaVSID: A Robust Meta-Reinforced Learning Approach for VSI-DDoS Detection on the Edge. IEEE Trans. Netw. Serv. Manag. 20(2): 1625-1643 (2023) - [c151]Lingying Huang, Rong Su, Maode Ma, Yun Lu, Bohui Wang, Zhijian Hu:
Preserving Data-Privacy Cooperative Control of Discrete-Time Multi-Agent Systems. CDC 2023: 2415-2420 - [c150]Yanan Zhang, Xin-Xin Guo, Maode Ma:
ADMBIFA: Accurate Detection and Mitigation of Blended Interest Flooding Attacks in NDNs. HPSR 2023: 56-61 - [c149]Danial Ritzuan Junaidi, Maode Ma, Rong Su:
An Efficient Multi-Blockchain Approach Towards Secure Platoon Management. SOLI 2023: 1-6 - [c148]Boyi Lei, Jianhong Zhou, Maode Ma, Xianhua Niu:
DQN based Blockchain Data Storage in Resource-constrained IoT System. WCNC 2023: 1-6 - [c147]Junwei Liang, Maode Ma, Geng Yang:
Efficient-Lightweight CRL Distribution in VANETs: A Multilayer Coded Caching Methodology. WCNC 2023: 1-6 - 2022
- [j232]Lei Yan, Maode Ma, Dandan Li, Xiaohong Huang, Yan Ma, Kun Xie:
A flexible and lightweight privacy-preserving handshake protocol based on DTLShps for IoT. Comput. Networks 216: 109169 (2022) - [j231]Kushan Sudheera Kalupahana Liyanage, Maode Ma, Peter Han Joo Chong:
Real-time cooperative data routing and scheduling in software defined vehicular networks. Comput. Commun. 181: 203-214 (2022) - [j230]Xiaobei Yan, Maode Ma:
A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks. Comput. Secur. 116: 102601 (2022) - [j229]Harun Surej Ilango, Maode Ma, Rong Su:
A FeedForward-Convolutional Neural Network to Detect Low-Rate DoS in IoT. Eng. Appl. Artif. Intell. 114: 105059 (2022) - [j228]Harun Surej Ilango, Maode Ma, Rong Su:
A misbehavior detection system to detect novel position falsification attacks in the Internet of Vehicles. Eng. Appl. Artif. Intell. 116: 105380 (2022) - [j227]Xiongpeng Ren, Jin Cao, Maode Ma, Hui Li, Yinghui Zhang:
A Novel PUF-Based Group Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks. IEEE Internet Things J. 9(5): 3642-3656 (2022) - [j226]Yangxia Hu, Wenhuan Lu, Maode Ma, Qilong Sun, Jianguo Wei:
A semi fragile watermarking algorithm based on compressed sensing applied for audio tampering detection and recovery. Multim. Tools Appl. 81(13): 17729-17746 (2022) - [j225]Man Chun Chow, Maode Ma:
A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks. Sensors 22(12): 4525 (2022) - [j224]Danial Ritzuan Junaidi, Maode Ma, Rong Su:
Secure Vehicular Platoon Management against Sybil Attacks. Sensors 22(22): 9000 (2022) - [j223]Aining Chi, Maode Ma, Yiying Zhang, Zhigang Jin:
Competitive teaching-learning-based optimization for multimodal optimization problems. Soft Comput. 26(19): 10163-10186 (2022) - [j222]Yunqing Sun, Jin Cao, Maode Ma, Yinghui Zhang, Hui Li, Ben Niu:
EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet. IEEE Trans. Dependable Secur. Comput. 19(1): 370-387 (2022) - [j221]Junwei Liang, Maode Ma:
FS-MOEA: A Novel Feature Selection Algorithm for IDSs in Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 23(1): 368-382 (2022) - [j220]Junwei Liang, Maode Ma, Xu Tan:
GaDQN-IDS: A Novel Self-Adaptive IDS for VANETs Based on Bayesian Game Theory and Deep Reinforcement Learning. IEEE Trans. Intell. Transp. Syst. 23(8): 12724-12737 (2022) - [j219]Zuobin Ying, Maode Ma, Zijun Zhao, Ximeng Liu, Jianfeng Ma:
A Reputation-Based Leader Election Scheme for Opportunistic Autonomous Vehicle Platoon. IEEE Trans. Veh. Technol. 71(4): 3519-3532 (2022) - [j218]Chunpeng Liu, Wei-Xiao Meng, Cheng Li, Maode Ma:
Active Computing Toward 5G Internet of Things. IEEE Wirel. Commun. 29(2): 124-130 (2022) - [c146]Man Chun Chow, Maode Ma:
Secure D2D in 5G Cellular Networks: Architecture, Requirements and Solutions. Honoring Professor Mohammad S. Obaidat 2022: 583-616 - [c145]Junwei Liang, Maode Ma, Geng Yang:
Self-Adaptive IDS in VANETs: A Game Theory and Deep Q-Learning Network Based Generic Scheme. GLOBECOM 2022: 2891-2896 - [c144]Danial Ritzuan Junaidi, Maode Ma, Rong Su:
Effective Authentication to Prevent Sybil Attacks in Vehicular Platoons. ICARCV 2022: 949-954 - [c143]Harun Surej Ilango, Maode Ma, Rong Su:
Novel Position Falsification Attacks Detection in the Internet of Vehicles using Machine Learning. ICARCV 2022: 955-960 - [c142]Xiaobei Yan, Maode Ma, Rong Su:
A Certificateless Efficient and Secure Group Handover Authentication Protocol in 5G Enabled Vehicular Networks. ICC 2022: 1678-1684 - [c141]Tongfei Liu, Hui Wang, Maode Ma:
Federated Learning for Heterogeneous Mobile Edge Device: A Client Selection Game. MSN 2022: 897-902 - [c140]Cong Wang, Xiaohang Li, Maode Ma, Yiying Zhang:
A Novel and Efficient Anonymous Authentication Scheme Based on Extended Chebyshev Chaotic Maps for Smart Grid. WoWMoM 2022: 288-293 - 2021
- [j217]Rongbo Zhu, Lu Liu, Ashq Anjum, Maode Ma, Shiwen Mao:
Ieee Access Special Section Editorial: Human-Driven Edge Computing. IEEE Access 9: 93948-93953 (2021) - [j216]Rongbo Zhu, Lu Liu, Maode Ma, Hongxiang Li, Shiwen Mao:
IEEE Access Special Section Editorial: Urban Computing and Intelligence. IEEE Access 9: 130690-130697 (2021) - [j215]Man Chun Chow, Maode Ma:
A lightweight traceable D2D authentication and key agreement scheme in 5G cellular networks. Comput. Electr. Eng. 95: 107375 (2021) - [j214]Guanglin Xing, Jing Chen, Rui Hou, Lingyun Zhou, Mianxiong Dong, Deze Zeng, Jiangtao Luo, Maode Ma:
Isolation Forest-Based Mechanism to Defend against Interest Flooding Attacks in Named Data Networking. IEEE Commun. Mag. 59(3): 98-103 (2021) - [j213]Lyuye Zhang, Maode Ma, Yue Qiu:
An enhanced handover authentication solution for 6LoWPAN networks. Comput. Secur. 109: 102373 (2021) - [j212]Zuobin Ying, Yun Zhang, Shuanglong Cao, Shengmin Xu, Maode Ma:
OIDPR: Optimized insulin dosage via privacy-preserving reinforcement learning. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j211]Lijun Gao, Feng Lin, Maode Ma:
Research on Ultra-Lightweight RFID Mutual Authentication Protocol Based on Stream Cipher. IEICE Trans. Commun. 104-B(1): 13-19 (2021) - [j210]Lijun Gao, Zhenyi Bian, Maode Ma:
Research on DoS Attacks Intrusion Detection Model Based on Multi-Dimensional Space Feature Vector Expansion K-Means Algorithm. IEICE Trans. Commun. 104-B(11): 1377-1385 (2021) - [j209]Guanglin Xing, Yumeng Chen, Rui Hou, Mianxiong Dong, Deze Zeng, Jiangtao Luo, Maode Ma:
Game-Theory-Based Clustering Scheme for Energy Balancing in Underwater Acoustic Sensor Networks. IEEE Internet Things J. 8(11): 9005-9013 (2021) - [j208]Yi Xie, Yulin Wang, Maode Ma:
A blockchain-based authentication scheme for the machine-to-machine communication of a cyber physical system. J. Intell. Fuzzy Syst. 41(3): 4425-4430 (2021) - [j207]Xiaobei Yan, Maode Ma:
A lightweight and secure handover authentication scheme for 5G network using neighbour base stations. J. Netw. Comput. Appl. 193: 103204 (2021) - [j206]Bin Lian, Gongliang Chen, Jialin Cui, Maode Ma:
Compact E-Cash with Efficient Coin-Tracing. IEEE Trans. Dependable Secur. Comput. 18(1): 220-234 (2021) - [j205]Jin Cao, Maode Ma, Yulong Fu, Hui Li, Yinghui Zhang:
CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets. IEEE Trans. Dependable Secur. Comput. 18(3): 1182-1195 (2021) - [j204]Junwei Liang, Maode Ma:
ECF-MRS: An Efficient and Collaborative Framework With Markov-Based Reputation Scheme for IDSs in Vehicular Networks. IEEE Trans. Inf. Forensics Secur. 16: 278-290 (2021) - [j203]Qinglei Kong, Le Su, Maode Ma:
Achieving Privacy-Preserving and Verifiable Data Sharing in Vehicular Fog With Blockchain. IEEE Trans. Intell. Transp. Syst. 22(8): 4889-4898 (2021) - [j202]M. Poongodi, Ashutosh Sharma, Mounir Hamdi, Maode Ma, Naveen K. Chilamkurti:
Smart healthcare in smart cities: wireless patient monitoring system using IoT. J. Supercomput. 77(11): 12230-12255 (2021) - [j201]Rui Hou, Shuo Zhou, Yong Zheng, Mianxiong Dong, Kaoru Ota, Deze Zeng, Jiangtao Luo, Maode Ma:
Cluster Routing-Based Data Packet Backhaul Prediction Method in Vehicular Named Data Networking. IEEE Trans. Netw. Sci. Eng. 8(3): 2639-2650 (2021) - [j200]Junwei Liang, Maode Ma:
Co-Maintained Database Based on Blockchain for IDSs: A Lifetime Learning Framework. IEEE Trans. Netw. Serv. Manag. 18(2): 1629-1645 (2021) - [j199]Rui Hou, Shuo Zhou, Mengtian Cui, Lingyun Zhou, Deze Zeng, Jiangtao Luo, Maode Ma:
Data Forwarding Scheme for Vehicle Tracking in Named Data Networking. IEEE Trans. Veh. Technol. 70(7): 6684-6695 (2021) - [c139]Huiying Jiang, Maode Ma:
Binary Tree-Based Interest Flooding Attack Detection and Mitigation in NDNs. DSIT 2021: 299-304 - [c138]Junwei Liang, Maode Ma:
An Efficiency-Accuracy Tradeoff for IDSs in VANETs with Markov-based Reputation Scheme. ICC 2021: 1-6 - [c137]Fengye Yu, Maode Ma, Xiaohong Li:
A Blockchain-Assisted Seamless Handover Authentication for V2I Communication in 5G Wireless Networks. ICC 2021: 1-6 - [c136]Xiaobei Yan, Maode Ma:
NSEHA: A Neighbor-based Secure and Efficient Handover Authentication Mechanism for 5G Networks. ICCBN 2021: 209-216 - [c135]Ting Ma, Feng Hu, Maode Ma:
A LSTM-Based Channel Fingerprinting Method for Intrusion Detection. CSP 2021: 113-116 - [c134]Vu Thi Hoang Ahn, Maode Ma:
A Secure Authentication Protocol with Performance Enhancements for 4G LTE/LTE-A Wireless Networks. IECC 2021: 28-36 - [c133]Harun Surej Ilango, Maode Ma, Rong Su:
Low Rate DoS Attack Detection in IoT - SDN using Deep Learning. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2021: 115-120 - [c132]Saksham Bhushan, Maode Ma:
Priority-Queue based Dynamic Scaling for Efficient Resource Allocation in Fog Computing. SOLI 2021: 1-6 - [c131]Xue Jun Li, Maode Ma, Yong Xing Yong:
A Blockchain-Based Security Scheme for Vehicular Ad Hoc Networks in Smart Cities. TENCON 2021: 266-271 - [c130]Xue Jun Li, Maode Ma, Cho Wai Hlaing:
Improved Handshaking Procedures for Transport Layer Security in Software Defined Networks. TENCON 2021: 305-310 - [i6]Saksham Bhushan, Maode Ma:
Priority-Queue based Dynamic Scaling for Efficient Resource Allocation in Fog Computing. CoRR abs/2107.08300 (2021) - 2020
- [j198]Lyuye Zhang, Maode Ma:
FKR: An efficient authentication scheme for IEEE 802.11ah networks. Comput. Secur. 88 (2020) - [j197]Jin Cao, Maode Ma, Hui Li, Ruhui Ma, Yunqing Sun, Pu Yu, Lihui Xiong:
A Survey on Security Aspects for 3GPP 5G Networks. IEEE Commun. Surv. Tutorials 22(1): 170-195 (2020) - [j196]Yiying Zhang, Maode Ma, Zhigang Jin:
Backtracking search algorithm with competitive learning for identification of unknown parameters of photovoltaic systems. Expert Syst. Appl. 160: 113750 (2020) - [j195]Xiaozhu Liu, Rongbo Zhu, Ashiq Anjum, Jun Wang, Hao Zhang, Maode Ma:
Intelligent data fusion algorithm based on hybrid delay-aware adaptive clustering in wireless sensor networks. Future Gener. Comput. Syst. 104: 1-14 (2020) - [j194]Rongbo Zhu, Lu Liu, Maode Ma, Hongxiang Li:
Cognitive-inspired Computing: Advances and Novel Applications. Future Gener. Comput. Syst. 109: 706-709 (2020) - [j193]Han Lee, Maode Ma:
Blockchain-based mobility management for 5G. Future Gener. Comput. Syst. 110: 638-646 (2020) - [j192]Lyuye Zhang, Maode Ma:
Secure and efficient scheme for fast initial link setup against key reinstallation attacks in IEEE 802.11ah networks. Int. J. Commun. Syst. 33(2) (2020) - [j191]Lei Zhang, Cong Wang, Maode Ma, Daqing Zhang:
WiDIGR: Direction-Independent Gait Recognition System Using Commercial Wi-Fi Devices. IEEE Internet Things J. 7(2): 1178-1191 (2020) - [j190]Yan Ma, Lei Yan, Xiaohong Huang, Maode Ma, Dandan Li:
DTLShps: SDN-Based DTLS Handshake Protocol Simplification for IoT. IEEE Internet Things J. 7(4): 3349-3362 (2020) - [j189]Zhou Bin, Yuhao Yao, Xiao Liu, Rongbo Zhu, Arun Kumar Sangaiah, Maode Ma:
Storage and access optimization scheme based on correlation probabilities in the internet of vehicles. J. Intell. Transp. Syst. 24(3): 221-236 (2020) - [j188]Rongbo Zhu, Lu Liu, Houbing Song, Maode Ma:
Multi-access edge computing enabled internet of things: advances and novel applications. Neural Comput. Appl. 32(19): 15313-15316 (2020) - [j187]Zhengyi Shang, Maode Ma, Xiaohong Li:
A Secure Group-Oriented Device-to-Device Authentication Protocol for 5G Wireless Networks. IEEE Trans. Wirel. Commun. 19(11): 7021-7032 (2020) - [j186]Zuobin Ying, Longyang Yi, Maode Ma:
BEHT: Blockchain-Based Efficient Highway Toll Paradigm for Opportunistic Autonomous Vehicle Platoon. Wirel. Commun. Mob. Comput. 2020: 8868656:1-8868656:13 (2020) - [j185]Lijun Gao, Lu Zhang, Feng Lin, Maode Ma:
An Efficient Secure Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN in Unattended Scenarios. Wirel. Pers. Commun. 115(2): 1603-1621 (2020) - [c129]M. Poongodi, Mounir Hamdi, V. Vijayakumar, Bharat S. Rawal, Maode Ma:
An Effective Electronic waste management solution based on Blockchain Smart Contract in 5G Communities. 5G World Forum 2020: 1-6 - [c128]Junwei Liang, Maode Ma:
Incremental Database Based on Distributed Ledger Technology for IDSs. GLOBECOM 2020: 1-6 - [c127]Zuobin Ying, Shuanglong Cao, Shengmin Xu, Ximeng Liu, Maode Ma:
Privacy-preserving Intelligent Traffic Light Control. GLOBECOM 2020: 1-6 - [c126]Man Chun Chow, Maode Ma:
A Lightweight D2D Authentication Scheme against Free-riding Attacks in 5G Cellular Network. IECC 2020: 143-149 - [c125]Junwei Liang, Maode Ma:
Design of Feature Selection Algorithm Based on MOEA for IDSs in VANETs. IECC 2020: 155-160 - [c124]Alican Ozhelvaci, Maode Ma:
A Group Authentication Scheme with Privacy-preserving for D2D Communications in 5G HetNets. IECC 2020: 170-175 - [c123]Poongodi M, Mounir Hamdi, Vijayakumar Varadarajan, Bharat S. Rawal, Maode Ma:
Building an Authentic and Ethical Keyword Search by applying Decentralised (Blockchain) Verification. INFOCOM Workshops 2020: 746-753 - [i5]Yangxia Hu, Maode Ma, Wenhuan Lu, Neal N. Xiong, Jianguo Wei:
Selection of the optimal embedding positions of digital audio watermarking in wavelet domain. CoRR abs/2010.11461 (2020)
2010 – 2019
- 2019
- [j184]Lijun Gao, Lu Zhang, Feng Lin, Maode Ma:
Secure RFID Authentication Schemes Based on Security Analysis and Improvements of the USI Protocol. IEEE Access 7: 8376-8384 (2019) - [j183]Jianhong Zhou, Maode Ma, Sanshan Sun:
A Hybrid Authentication Protocol for LTE/LTE-A Network. IEEE Access 7: 28319-28333 (2019) - [j182]Lijun Gao, Yanting Li, Lu Zhang, Feng Lin, Maode Ma:
Research on Detection and Defense Mechanisms of DoS Attacks Based on BP Neural Network and Game Theory. IEEE Access 7: 43018-43030 (2019) - [j181]Lingfeng Liu, Maode Ma, Chunfeng Liu, Wenyu Qu, Gang Zhang, Yantai Shu:
ATCFS: Effective Connectivity Restoration Scheme for Underwater Acoustic Sensor Networks. IEEE Access 7: 87704-87715 (2019) - [j180]M. Poongodi, V. Vijayakumar, Fadi Al-Turjman, Mounir Hamdi, Maode Ma:
Intrusion Prevention System for DDoS Attack on VANET With reCAPTCHA Controller Using Information Based Metrics. IEEE Access 7: 158481-158491 (2019) - [j179]M. Poongodi, Mounir Hamdi, Ashutosh Sharma, Maode Ma, Pradeep Kumar Singh:
DDoS Detection Mechanism Using Trust-Based Evaluation System in VANET. IEEE Access 7: 183532-183544 (2019) - [j178]A. Christy Jeba Malar, G. Kousalya, Maode Ma:
Markovian model based indoor location tracking for Internet of Things (IoT) applications. Clust. Comput. 22(5): 11805-11812 (2019) - [j177]Kushan Sudheera Kalupahana Liyanage, Maode Ma, Peter Han Joo Chong:
Connectivity aware tribrid routing framework for a generalized software defined vehicular network. Comput. Networks 152: 167-177 (2019) - [j176]Lingyun Zhou, Lixin Ding, Maode Ma, Wan Tang:
An accurate partially attracted firefly algorithm. Computing 101(5): 477-493 (2019) - [j175]Qinglei Kong, Rongxing Lu, Maode Ma, Haiyong Bao:
A privacy-preserving sensory data sharing scheme in Internet of Vehicles. Future Gener. Comput. Syst. 92: 644-655 (2019) - [j174]Jin Cao, Maode Ma, Hui Li:
LPPA: Lightweight privacy-preservation access authentication scheme for massive devices in fifth Generation (5G) cellular networks. Int. J. Commun. Syst. 32(3) (2019) - [j173]Jin Cao, Pu Yu, Maode Ma, Weifeng Gao:
Fast Authentication and Data Transfer Scheme for Massive NB-IoT Devices in 3GPP 5G Network. IEEE Internet Things J. 6(2): 1561-1575 (2019) - [j172]Jin Cao, Pu Yu, Xinyin Xiang, Maode Ma, Hui Li:
Anti-Quantum Fast Authentication and Data Transmission Scheme for Massive Devices in 5G NB-IoT System. IEEE Internet Things J. 6(6): 9794-9805 (2019) - [j171]Junwei Liang, Maode Ma, Muhammad Sadiq, Kai-Hau Yeung:
A filter model for intrusion detection system in Vehicle Ad Hoc Networks: A hidden Markov methodology. Knowl. Based Syst. 163: 611-623 (2019) - [j170]Lin Lin, Qian Wu, Maode Ma, Hao Yan:
Concentration-based demodulation scheme for mobile receiver in molecular communication. Nano Commun. Networks 20: 11-19 (2019) - [j169]Rui Hou, Min Han, Jing Chen, Wenbin Hu, Xiaobin Tan, Jiangtao Luo, Maode Ma:
Theil-Based Countermeasure against Interest Flooding Attacks for Named Data Networks. IEEE Netw. 33(3): 116-121 (2019) - [j168]Xuemei Sun, Yongxin Yang, Maode Ma:
Minimum Connected Dominating Set Algorithms for Ad Hoc Sensor Networks. Sensors 19(8): 1919 (2019) - [j167]Shu-Yang Gao, Xiao-Hong Li, Maode Ma:
A Malicious Behavior Awareness and Defense Countermeasure Based on LoRaWAN Protocol. Sensors 19(23): 5122 (2019) - [j166]Lingyun Zhou, Maode Ma, Lixin Ding, Wan Tang:
Centroid opposition with a two-point full crossover for the partially attracted firefly algorithm. Soft Comput. 23(23): 12241-12254 (2019) - [j165]Yanhong Li, Wang Zhang, Rongbo Zhu, Guohui Li, Maode Ma, LihChyun Shu, Changyin Luo:
Fog-Based Pub/Sub Index With Boolean Expressions in the Internet of Industrial Vehicles. IEEE Trans. Ind. Informatics 15(3): 1629-1642 (2019) - [j164]Qinglei Kong, Rongxing Lu, Maode Ma, Haiyong Bao:
A Privacy-Preserving and Verifiable Querying Scheme in Vehicular Fog Data Dissemination. IEEE Trans. Veh. Technol. 68(2): 1877-1887 (2019) - [j163]Kushan Sudheera Kalupahana Liyanage, Maode Ma, Peter Han Joo Chong:
Link Stability Based Optimized Routing Framework for Software Defined Vehicular Networks. IEEE Trans. Veh. Technol. 68(3): 2934-2945 (2019) - [c122]Zhengyi Shang, Maode Ma, Xiaohong Li:
A Certificateless Authentication Protocol for D2D Group Communications in 5G Cellular Networks. GLOBECOM 2019: 1-7 - [c121]Zuobin Ying, Wenjie Jiang, Ximeng Liu, Maode Ma:
Privacy-Preserving Fine-Grained Outsourcing PHR with Efficient Policy Updating. ICA3PP (2) 2019: 512-520 - [c120]Yurong Luo, Jin Cao, Maode Ma, Hui Li, Ben Niu, Fenghua Li:
DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System. ICNC 2019: 418-424 - [c119]Yunqing Sun, Jin Cao, Maode Ma, Hui Li, Ben Niu, Fenghua Li:
Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet. ICNC 2019: 425-431 - [c118]Ting Ma, Feng Hu, Maode Ma:
Securing 5G HetNets Using Mutual Physical Layer Authentication. ICIT 2019: 275-278 - [c117]Maode Ma, Zhaozheng He, Quanqing Xu, Xue Jun Li:
Design and Development of Smart Home Sensing Supported by Blockchain Technology. ICIT 2019: 525-530 - [c116]Zuobin Ying, Maode Ma, Longyang Yi:
BAVPM: Practical Autonomous Vehicle Platoon Management Supported by Blockchain Technique. ICITE 2019: 256-260 - [c115]Monowar H. Bhuyan, Maode Ma, Youki Kadobayashi, Erik Elmroth:
Information-Theoretic Ensemble Learning for DDoS Detection with Adaptive Boosting. ICTAI 2019: 995-1002 - [c114]Xue Jun Li, Maode Ma, Narayanan Arjun:
An Encryption Algorithm to Prevent Domain Name System Cache Poisoning Attacks. ITNAC 2019: 1-6 - [c113]Xue Jun Li, Maode Ma, Yi Lin Yen:
Detecting IRC-based Botnets by Network Traffic Analysis Through Machine Learning. ITNAC 2019: 1-6 - [c112]Han Lee, Maode Ma:
Blockchain-Based Mobility Management for LTE and Beyond. SpaCCS 2019: 36-49 - [c111]Lei Yan, Maode Ma, Yan Ma:
TLShps: SDN-Based TLS Handshake Protocol Simplification for IoT. SpaCCS 2019: 166-182 - [c110]Kaihong Han, Maode Ma, Xiaohong Li, Zhiyong Feng, Jianye Hao:
An Efficient Handover Authentication Mechanism for 5G Wireless Network. WCNC 2019: 1-8 - [c109]Gurbakshish Singh Toor, Maode Ma:
CETVSP: Cost Efficient Trust-Based Vehicle Selection for Platoon. WCNC 2019: 1-6 - [c108]Pu Yu, Jin Cao, Maode Ma, Hui Li, Ben Niu, Fenghua Li:
Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks. WCNC 2019: 1-7 - [c107]Lyuye Zhang, Maode Ma:
Secure and Efficient Fast Initial Link Setup Scheme Design. WCNC 2019: 1-6 - 2018
- [j162]Kun Xie, Xiaohong Huang, Shuai Hao, Maode Ma:
Distributed Power Saving for Large-Scale Software-Defined Data Center Networks. IEEE Access 6: 5897-5909 (2018) - [j161]Keyu Chen, En Cheng, Fei Yuan, Wei Su, Maode Ma:
The Influence of MAC Protocol on a Non-Synchronous Localization Scheme in Large-Scale UWSNs. IEEE Access 6: 16386-16394 (2018) - [j160]Xiaohong Huang, Tingting Yuan, Maode Ma:
Utility-Optimized Flow-Level Bandwidth Allocation in Hybrid SDNs. IEEE Access 6: 20279-20290 (2018) - [j159]Qinglei Kong, Rongxing Lu, Hui Zhu, Maode Ma:
Achieving Secure and Privacy-Preserving Incentive in Vehicular Cloud Advertisement Dissemination. IEEE Access 6: 25040-25050 (2018) - [j158]Xiaohong Huang, Yunlong Lu, Dandan Li, Maode Ma:
A Novel Mechanism for Fast Detection of Transformed Data Leakage. IEEE Access 6: 35926-35936 (2018) - [j157]Zhao Zhao, Chunfeng Liu, Zhihua Li, Bin Wu, Maode Ma, Zenghua Zhao, Lingfeng Liu:
EBTCOR: an Energy-Balanced 3D Topology Control Algorithm Based on Optimally Rigid Graph in UWSNs. Ad Hoc Sens. Wirel. Networks 42(3-4): 295-315 (2018) - [j156]Kushan Sudheera Kalupahana Liyanage, Maode Ma, Peter Han Joo Chong:
Controller placement optimization in hierarchical distributed software defined vehicular networks. Comput. Networks 135: 226-239 (2018) - [j155]Xiaohong Huang, Kun Xie, Supeng Leng, Tingting Yuan, Maode Ma:
Improving Quality of Experience in multimedia Internet of Things leveraging machine learning on big data. Future Gener. Comput. Syst. 86: 1413-1423 (2018) - [j154]Tao Wang, Yonghong Hou, Maode Ma:
A Novel Receiver Design for HACO-OFDM by Time-Domain Clipping Noise Elimination. IEEE Commun. Lett. 22(9): 1862-1865 (2018) - [j153]Yue Qiu, Maode Ma:
Secure Group Mobility Support for 6LoWPAN Networks. IEEE Internet Things J. 5(2): 1131-1141 (2018) - [j152]Cheng Xu, Xiaohong Huang, Maode Ma, Hong Bao:
A Secure and Efficient Message Authentication Scheme for Vehicular Networks based on LTE-V. KSII Trans. Internet Inf. Syst. 12(6): 2841-2860 (2018) - [j151]Jin Cao, Maode Ma, Hui Li, Yulong Fu, Xuefeng Liu:
EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks. J. Netw. Comput. Appl. 102: 1-16 (2018) - [j150]Jin Cao, Hui Li, Maode Ma, Fenghua Li:
UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks. Secur. Commun. Networks 2018: 6854612:1-6854612:16 (2018) - [j149]Cheng Xu, Xiaohong Huang, Maode Ma, Hong Bao:
An Anonymous Handover Authentication Scheme Based on LTE-A for Vehicular Networks. Wirel. Commun. Mob. Comput. 2018: 6251219:1-6251219:15 (2018) - [c106]Yue Qiu, Maode Ma:
A Privacy-Preserving Proximity Testing for Location-Based Services. GLOBECOM 2018: 1-6 - [c105]Yunlong Lu, Xiaohong Huang, Yan Ma, Maode Ma:
A Weighted Context Graph Model for Fast Data Leak Detection. ICC 2018: 1-6 - [c104]Kushan Sudheera Kalupahana Liyanage, Maode Ma, Peter Han Joo Chong:
Link Stability Based Hybrid Routing Protocol for Software Defined Vehicular Networks. ICC 2018: 1-6 - [c103]Tingting Yuan, Xiaohong Huang, Maode Ma, Jie Yuan:
Balance-Based SDN Controller Placement and Assignment with Minimum Weight Matching. ICC 2018: 1-6 - [c102]Lyuye Zhang, Maode Ma:
Performance and Security Enhancements to Fast Initial Link Setup in IEEE 802.11ah Wireless Networks. ICC Workshops 2018: 1-6 - [c101]Qing Wang, Shunfu Wang, Minjiong Zhu, Maode Ma, Hua Chen:
A Bio-Inspired and User-Experience Preferred Load-Balance Algorithm for Heterogeneous Networks. ICCC 2018: 335-340 - [c100]Yue Qiu, Maode Ma:
Privacy Preserving for Location-Based IoT Services. SGIoT 2018: 36-45 - [c99]Xue Jun Li, Maode Ma, Jiecheng Xie:
Temporary Internet Access for Authentication and Key Agreement for LTE Networks. SmartGIFT 2018: 1-10 - [c98]Salman Naseer, William Liu, Nurul I. Sarkar, Peter Han Joo Chong, Edmund M.-K. Lai, Maode Ma, Rangarao Venkatesha Prasad, Tran Cong Danh, Luca Chiaraviglio, Junaid Qadir, Yue Cao, Jinsong Wu, Raymond Lutui, Shahid Manzoor:
A Sustainable Marriage of Telcos and Transp in the Era of Big Data: Are We Ready? SmartGIFT 2018: 210-219 - [c97]Kushan Sudheera Kalupahana Liyanage, Maode Ma, Peter Han Joo Chong:
Cooperative Data Routing & Scheduling In Software Defined Vehicular Networks. VNC 2018: 1-8 - [c96]Chun-Peng Liu, Maode Ma, Chen-Guang He, Wei-Xiao Meng:
Modeling and analysis on double-tiered device-to-device communications in vehicle networks. WCNC 2018: 1-6 - 2017
- [j148]Bing Li, Maode Ma, Xinbin Yang:
Advanced Perceptive Forwarding in Content-Centric Networks. IEEE Access 5: 4595-4605 (2017) - [j147]Shen Yan, Xiaohong Huang, Maode Ma, Pei Zhang, Yan Ma:
A Novel Efficient Address Mutation Scheme for IPv6 Networks. IEEE Access 5: 7724-7736 (2017) - [j146]Cong Wang, Maode Ma, Lei Zhang:
An Efficient EAP-Based Pre-Authentication for Inter-WRAN Handover in TV White Space. IEEE Access 5: 9785-9796 (2017) - [j145]Yanhong Li, Ziqing Huang, Rongbo Zhu, Guohui Li, LihChyun Shu, Shasha Tian, Maode Ma:
Parameterized Spatio-Textual Publish/Subscribe in Road Sensor Networks. IEEE Access 5: 22940-22952 (2017) - [j144]Xuemei Sun, Kai Zhang, Maode Ma, Hua Su:
Multi-Population Ant Colony Algorithm for Virtual Machine Deployment. IEEE Access 5: 27014-27022 (2017) - [j143]Rongbo Zhu, Maode Ma, Lu Liu, Shiwen Mao:
A Special Section in IEEE Access: Cooperative and Intelligent Sensing. IEEE Access 5: 27824-27826 (2017) - [j142]Yue Qiu, Maode Ma, Shuo Chen:
An anonymous authentication scheme for multi-domain machine-to-machine communication in cyber-physical systems. Comput. Networks 129: 306-318 (2017) - [j141]Cheng Siong Chin, JianTing Si, Anthony S. Clare, Maode Ma:
Intelligent Image Recognition System for Marine Fouling Using Softmax Transfer Learning and Deep Convolutional Neural Networks. Complex. 2017: 5730419:1-5730419:9 (2017) - [j140]Lin Lin, Jiali Zhang, Maode Ma, Hao Yan:
Time Synchronization for Molecular Communication With Drift. IEEE Commun. Lett. 21(3): 476-479 (2017) - [j139]Gen Li, Maode Ma, Chunfeng Liu, Yantai Shu:
Adaptive fuzzy multiple attribute decision routing in VANETs. Int. J. Commun. Syst. 30(4) (2017) - [j138]Hengchuan Tan, Maode Ma, Houda Labiod, Peter Han Joo Chong, Jun Zhang:
A non-biased trust model for wireless mesh networks. Int. J. Commun. Syst. 30(9) (2017) - [j137]Bing Zhang, Maode Ma, Chunfeng Liu, Yantai Shu:
Delay guaranteed MDP scheduling scheme for HCCA based on 802.11p protocol in V2R environments. Int. J. Commun. Syst. 30(15) (2017) - [j136]Cong Wang, Maode Ma, Zenghua Zhao:
An efficient EAP-based proxy signature handover authentication scheme for WRANs over TV white space. Int. J. Commun. Syst. 30(17) (2017) - [j135]Cheng Xu, Xiaohong Huang, Maode Ma, Hong Bao:
A Privacy-preserving and Cross-domain Group Authentication Scheme for Vehicular in LTE-A Networks. J. Commun. 12(11): 604 (2017) - [j134]Yue Qiu, Maode Ma, Xilei Wang:
A proxy signature-based handover authentication scheme for LTE wireless networks. J. Netw. Comput. Appl. 83: 63-71 (2017) - [j133]Cong Wang, Maode Ma, Zenghua Zhao:
Design of a novel dynamic trust model for spectrum management in WRANs of TV white space. J. Netw. Comput. Appl. 100: 1-10 (2017) - [j132]Qinglei Kong, Rongxing Lu, Maode Ma, Haiyong Bao:
Achieve Location Privacy-Preserving Range Query in Vehicular Sensing. Sensors 17(8): 1829 (2017) - [j131]Lingfeng Liu, Maode Ma, Chunfeng Liu, Yantai Shu:
Optimal Relay Node Placement and Flow Allocation in Underwater Acoustic Sensor Networks. IEEE Trans. Commun. 65(5): 2141-2152 (2017) - [j130]Yonghong Hou, Jianming Xu, Wei Xiang, Maode Ma, Jianjun Lei:
Near-Optimal Cross-Layer Forward Error Correction Using Raptor and RCPC Codes for Prioritized Video Transmission Over Wireless Channels. IEEE Trans. Circuits Syst. Video Technol. 27(9): 2028-2040 (2017) - [j129]Jin Cao, Maode Ma, Hui Li:
G2RHA: Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks. IEEE Trans. Veh. Technol. 66(11): 9689-9701 (2017) - [j128]Wee-Kiat New, Chee-Onn Chow, Maode Ma:
Resource management for symmetrical applications over heterogeneous services in IEEE 802.16. Wirel. Networks 23(8): 2601-2616 (2017) - [j127]Mohammad Mehdi Gilanian Sadeghi, Borhanuddin Mohd Ali, Maode Ma, Jamalul-lail Ab Manan:
A Novel Energy Efficient Key Distribution Scheme for Mobile WiMAX Networks. Wirel. Pers. Commun. 92(2): 727-748 (2017) - [j126]Jin Cao, Maode Ma, Xilei Wang, Haochen Liu:
A Selective Re-Query Case Sensitive Encoding Scheme Against DNS Cache Poisoning Attacks. Wirel. Pers. Commun. 94(3): 1263-1279 (2017) - [j125]M. Jawad Alam, Maode Ma:
Resource Matching in Carrier Aggregation Enabling 5G Networks. Wirel. Pers. Commun. 95(2): 1229-1248 (2017) - [j124]Lijun Gao, Lu Zhang, Maode Ma:
Low Cost RFID Security Protocol Based on Rabin Symmetric Encryption Algorithm. Wirel. Pers. Commun. 96(1): 683-696 (2017) - [j123]Ting Ma, Maode Ma, Yee Hui Lee, Feng Hu:
Bitstream-Oriented Protection for the H.264/Scalable Video Coding (SVC). Wirel. Pers. Commun. 97(4): 5115-5135 (2017) - [c95]M. Jawad Alam, Maode Ma:
DC and CoMP Authentication in LTE-Advanced 5G HetNet. GLOBECOM 2017: 1-6 - [c94]Xiaohong Huang, Tingting Yuan, Maode Ma, Pei Zhang:
Utility-Based Network Bandwidth Allocation in the Hybrid SDNs. GLOBECOM 2017: 1-6 - [c93]Kushan Sudheera Kalupahana Liyanage, Maode Ma, Peter Han Joo Chong:
Link Dynamics Based Packet Routing Framework for Software Defined Vehicular Networks. GLOBECOM 2017: 1-6 - [c92]Cong Wang, Maode Ma, Zenghua Zhao, Yuan Wang:
An Efficient EAP-Based Pre-Authentication Scheme for Handovers in WRANs over TVWS. GLOBECOM 2017: 1-6 - [c91]Cheng Xu, Xiaohong Huang, Maode Ma, Hong Bao:
GAKAV: Group Authentication and Key Agreement for LTE/LTE-A Vehicular Networks. HPCC/SmartCity/DSS 2017: 412-418 - [c90]Jin Cao, Maode Ma, Hui Li, Yulong Fu, Ben Niu, Fenghua Li:
Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks. ICC 2017: 1-6 - [c89]Yue Qiu, Maode Ma:
A secure PMIPv6-based group mobility scheme for 6L0WPAN networks. ICC 2017: 1-6 - [c88]Ashish Kumar, Maode Ma, Chiew Tong Lau, Syin Chan:
A Framework of Real-time Wandering Management for Person with Dementia. ICCMS 2017: 146-150 - [c87]Qian Wu, Lin Lin, Zhan Luo, Maode Ma, Fuqiang Liu, Hao Yan:
Achievable rate for a mobile molecular communication system invited paper. ISPACS 2017: 838-843 - [c86]Ting Ma, Feng Hu, Maode Ma:
Fast and efficient physical layer authentication for 5G HetNet handover. ITNAC 2017: 1-3 - [c85]Qinglei Kong, Maode Ma, Rongxing Lu:
Achieving Secure CoMP Joint Transmission Handover in LTE-A Vehicular Networks. VTC Fall 2017: 1-5 - [c84]Kushan Sudheera Kalupahana Liyanage, Maode Ma, Peter Han Joo Chong:
Efficient Flow Instantiation via Source Routing in Software Defined Vehicular Networks. VTC Fall 2017: 1-5 - [c83]Ting Ma, Maode Ma, Feng Hu:
Scalable protection scheme for the H.264/SVC video streaming. WCSP 2017: 1-6 - [e7]Maode Ma, Cheolil Lim:
Proceedings of the 2017 International Conference on Education and Multimedia Technology, ICEMT '17, Singapore, Singapore, July 9-11, 2017. ACM 2017, ISBN 978-1-4503-5293-2 [contents] - [e6]Ruidong Li, Maode Ma:
Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering, ICTCE 2017, Osaka, Japan, October 22 - 24, 2017. ACM 2017, ISBN 978-1-4503-5315-1 [contents] - [i4]Hengchuan Tan, Maode Ma, Houda Labiod, Aymen Boudguiga, Jun Zhang, Peter Han Joo Chong:
A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks. CoRR abs/1712.09859 (2017) - [i3]Hengchuan Tan, Maode Ma, Houda Labiod, Peter Han Joo Chong, Jun Zhang:
A non-biased trust model for wireless mesh networks. CoRR abs/1712.09862 (2017) - [i2]Hengchuan Tan, Maode Ma, Houda Labiod, Peter Han Joo Chong:
TEDS: A Trusted Entropy and Dempster Shafer Mechanism for Routing in Wireless Mesh Networks. CoRR abs/1712.09864 (2017) - 2016
- [j122]Kun Xie, Xiaohong Huang, Shuai Hao, Maode Ma, Pei Zhang, Dingyuan Hu:
E3MC: Improving Energy Efficiency via Elastic Multi-Controller SDN in Data Center Networks. IEEE Access 4: 6780-6791 (2016) - [j121]Yanxin Yan, Yi Gong, Maode Ma:
Two-stage frequency-domain oversampling receivers for cyclic prefix orthogonal frequency-division multiplexing systems. IET Commun. 10(10): 1246-1254 (2016) - [j120]Xiaohong Huang, Qiong Sun, Maode Ma, Yan Ma:
H-LCFST: a hash lowest cost first search tree for flexible packet classification. Int. J. Netw. Manag. 26(4): 286-307 (2016) - [j119]Deepnarayan Tiwari, G. R. Gangadharan, Maode Ma:
Secure delegation of services through proxy signature with revocation. Int. J. Trust. Manag. Comput. Commun. 3(4): 291-318 (2016) - [j118]Zimao Li, Yingying Wang, Maode Ma:
Efficient Deployment of Base Stations in Wireless Communication Networks. J. Commun. 11(6): 609-615 (2016) - [j117]Qing Wang, Minjiong Zhu, Yongrun Yu, Maode Ma, Xin Cui:
A Load Balance Mechanism in Heterogeneous Network Based on Utility Function. J. Commun. 11(9): 871-878 (2016) - [j116]Jiancai Song, Chunping Hou, Guixiang Xue, Maode Ma:
Study of Constellation Design of Pseudolites Based on Improved Adaptive Genetic Algorithm. J. Commun. 11(9): 879-885 (2016) - [j115]Yang Yang, Maode Ma:
Semantic Searchable Encryption Scheme Based on Lattice in Quantum-Era. J. Inf. Sci. Eng. 32(2): 425-438 (2016) - [j114]Shuo Chen, Maode Ma, Zhenxing Luo:
An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems. Secur. Commun. Networks 9(10): 1146-1157 (2016) - [j113]Gurbakshish Singh Toor, Maode Ma:
Security enhancement for dynamic key refreshment in neighborhood area network of smart grid. Secur. Commun. Networks 9(16): 3353-3364 (2016) - [j112]Yuhang Yang, Maode Ma, Bahram Honary:
Special Issue on Cognitive-Inspired Network Systems. IEEE Syst. J. 10(1): 290-292 (2016) - [j111]Yang Yang, Maode Ma:
Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds. IEEE Trans. Inf. Forensics Secur. 11(4): 746-759 (2016) - [j110]Yue Qiu, Maode Ma:
A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks. IEEE Trans. Ind. Informatics 12(6): 2074-2085 (2016) - [j109]Jianhong Zhou, Maode Ma, Yong Feng, Thuy Ngoc Nguyen:
A symmetric key-based pre-authentication protocol for secure handover in mobile WiMAX networks. J. Supercomput. 72(7): 2734-2751 (2016) - [j108]Mattia Minelli, Maode Ma, Marceau Coupechoux, Jean-Marc Kelif, Marc Sigelle, Philippe Godlewski:
Uplink Energy-Delay Trade-Off under Optimized Relay Placement in Cellular Networks. IEEE Trans. Mob. Comput. 15(9): 2376-2387 (2016) - [j107]Mattia Minelli, Maode Ma, Marceau Coupechoux, Philippe Godlewski:
Scheduling Impact on the Performance of Relay-Enhanced LTE-A Networks. IEEE Trans. Veh. Technol. 65(4): 2496-2508 (2016) - [j106]Hengchuan Tan, Maode Ma, Houda Labiod, Aymen Boudguiga, Jun Zhang, Peter Han Joo Chong:
A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks. IEEE Trans. Veh. Technol. 65(12): 9570-9584 (2016) - [j105]Lin Lin, Chengfeng Yang, Maode Ma:
Offset and Skew Estimation for Clock Synchronization in Molecular Communication Systems. EAI Endorsed Trans. Ubiquitous Environ. 3(9): e4 (2016) - [j104]Kiam Cheng How, Maode Ma, Yang Qin:
Elastic bandwidth allocation scheme with softened peak interference power constraint for the dynamic cognitive radio systems. Wirel. Networks 22(5): 1699-1709 (2016) - [j103]Xue Jun Li, Maode Ma:
Joint Concurrent Routing and Multi-Pointer Packet Scheduling in IEEE 802.16 Mesh Networks. Wirel. Pers. Commun. 90(1): 33-50 (2016) - [c82]Ashish Kumar, Chiew Tong Lau, Syin Chan, Maode Ma, William D. Kearns:
A unified grid-based wandering pattern detection algorithm. EMBC 2016: 5401-5404 - [c81]Yue Qiu, Maode Ma:
A PMIPv6-Based Secured Mobility Scheme for 6LoWPAN. GLOBECOM 2016: 1-6 - [c80]Chengfeng Yang, Lin Lin, Feiyan Li, Shiwei Ma, Maode Ma:
Reference broadcast synchronization scheme for nanomachines. I2MTC 2016: 1-5 - [c79]Gen Li, Maode Ma, Chunfeng Liu, Yantai Shu:
An efficient authentication framework over heterogeneous vehicular networks. ICCS 2016: 1-6 - [c78]Kushan Sudheera Kalupahana Liyanage, Maode Ma, G. G. Md. Nawaz Ali, Peter Han Joo Chong:
Delay efficient software defined networking based architecture for vehicular networks. ICCS 2016: 1-6 - [c77]Lin Lin, Chengfeng Yang, Shiwei Ma, Maode Ma:
Parameter estimation of inverse Gaussian channel for diffusion-based molecular communication. WCNC 2016: 1-6 - [c76]Zhan Luo, Lin Lin, Maode Ma:
Offset estimation for clock synchronization in mobile molecular communication system. WCNC 2016: 1-6 - [e5]Maode Ma, Jalel Ben-Othman, Feng Gang, Masahiko Ooki, Gihwan Cho:
Proceedings of the 2nd International Conference on Communication and Information Processing, ICCIP 2016, Singapore, November 26-29, 2016. ACM 2016, ISBN 978-1-4503-4819-5 [contents] - [e4]Sabu M. Thampi, Sanghamitra Bandyopadhyay, Sri Krishnan, Kuan-Ching Li, Sergey G. Mosin, Maode Ma:
Advances in Signal Processing and Intelligent Recognition Systems - Proceedings of Second International Symposium on Signal Processing and Intelligent Recognition Systems (SIRS-2015) December 16-19, 2015, Trivandrum, India. Advances in Intelligent Systems and Computing 425, Springer 2016, ISBN 978-3-319-28656-3 [contents] - 2015
- [j102]Yanxin Yan, Maode Ma:
Novel Frequency-Domain Oversampling Receiver for CP MC-CDMA Systems. IEEE Commun. Lett. 19(4): 661-664 (2015) - [j101]Bing Zhang, Maode Ma, Chunfeng Liu, Yantai Shu:
Performance improvements of HCCA scheduling in V2R environments. Int. J. Commun. Syst. 28(5): 861-872 (2015) - [j100]Rongbo Zhu, Maode Ma, Yan Zhang, Jiankun Hu:
Collaborative Wireless Sensor Networks and Applications. Int. J. Distributed Sens. Networks 11: 352761:1-352761:2 (2015) - [j99]Zhenjing Zhang, Maode Ma, Zhigang Jin:
TR-SDTN: Trust Based Efficient and Scalable Routing in Hostile Social DTNs. Int. J. Distributed Sens. Networks 11: 690482:1-690482:11 (2015) - [j98]Ting Ma, Yee Hui Lee, Stefan Winkler, Maode Ma:
QoS provisioning by power control for video communication via satellite links. Int. J. Satell. Commun. Netw. 33(3): 259-275 (2015) - [j97]Cong Wang, Maode Ma, Zenghua Zhao:
An enhanced authentication protocol for WRANs in TV white space. Secur. Commun. Networks 8(13): 2267-2278 (2015) - [j96]Jin Cao, Maode Ma, Hui Li:
GBAAM: group-based access authentication for MTC in LTE networks. Secur. Commun. Networks 8(17): 3282-3299 (2015) - [j95]Zhenjing Zhang, Maode Ma, Zhigang Jin:
CCS-DTN: Clustering and Network Coding-Based Efficient Routing in Social DTNs. Sensors 15(1): 285-303 (2015) - [j94]Lin Lin, Chengfeng Yang, Maode Ma:
Maximum-Likelihood Estimator of Clock Offset between Nanomachines in Bionanosensor Networks. Sensors 15(12): 30827-30838 (2015) - [j93]Bin Lian, Gongliang Chen, Maode Ma, Jianhua Li:
Periodic K-Times Anonymous Authentication With Efficient Revocation of Violator's Credential. IEEE Trans. Inf. Forensics Secur. 10(3): 543-557 (2015) - [c75]M. Jawad Alam, Maode Ma:
Pareto efficient resource matching for LTE-A system. ICICS 2015: 1-5 - [c74]Xue Jun Li, Maode Ma:
Effect of coupling capacitance in voltage multiplier design optimization for RF energy harvesting. ICICS 2015: 1-5 - [c73]Gurbakshish Singh Toor, Maode Ma:
Neighborhood area network security in smart grid using security enhanced key updating. ICICS 2015: 1-5 - [c72]Lin Lin, Chengfeng Yang, Maode Ma:
Offset and Skew Estimation for Clock Synchronization in Molecular Communication Systems. BICT 2015: 152-156 - [c71]Shuo Chen, Maode Ma, Zhenxing Luo:
An Authentication Framework for Multi-Domain Machine-to-Machine Communication in Cyber-Physical Systems. GLOBECOM Workshops 2015: 1-6 - [c70]Bing Li, Maode Ma, Shiqing Hu:
Perceptive Forwarding Strategy in Content-Centric Network. GLOBECOM Workshops 2015: 1-6 - [c69]Gen Li, Maode Ma, Chunfeng Liu, Yantai Shu:
A Lightweight Secure VANET-Based Navigation System. GLOBECOM 2015: 1-6 - [c68]Deepnarayan Tiwari, G. R. Gangadharan, Maode Ma:
Provable secure protected designated proxy signature with revocation. ICACCI 2015: 2033-2041 - [c67]Zhenjing Zhang, Maode Ma, Zhigang Jin:
TR-SDTN: Trust based efficient routing in hostile social DTNs. ICC Workshops 2015: 1587-1592 - [c66]Yue Qiu, Maode Ma:
An authentication and key establishment scheme to enhance security for M2M in 6LoWPANs. ICC Workshops 2015: 2671-2676 - [c65]Jin Cao, Hui Li, Maode Ma:
GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks. ICC 2015: 3020-3025 - [c64]Jin Cao, Hui Li, Maode Ma, Fenghua Li:
UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks. ICC 2015: 7246-7251 - [c63]Heng Chuan Tan, Jun Zhang, Maode Ma, Peter Han Joo Chong, Houda Labiod:
Secure Public Key Regime (SPKR) in vehicular networks. SSIC 2015: 1-7 - [i1]Mattia Minelli, Maode Ma, Marceau Coupechoux, Jean-Marc Kelif, Marc Sigelle, Philippe Godlewski:
Uplink Energy-Delay Trade-off under Optimized Relay Placement in Cellular Networks. CoRR abs/1505.00921 (2015) - 2014
- [j92]Yuhang Yang, Maode Ma:
Sustainable mobile computing. Computing 96(2): 85-86 (2014) - [j91]Jin Cao, Maode Ma, Hui Li, Yueyu Zhang, Zhenxing Luo:
A Survey on Security Aspects for LTE and LTE-A Networks. IEEE Commun. Surv. Tutorials 16(1): 283-302 (2014) - [j90]Keyu Chen, Maode Ma, En Cheng, Fei Yuan, Wei Su:
A Survey on MAC Protocols for Underwater Wireless Sensor Networks. IEEE Commun. Surv. Tutorials 16(3): 1433-1447 (2014) - [j89]Yanxin Yan, Maode Ma:
SNR Improvement for Energy Detection of Narrow Band Signal in OFDM System. IEEE Commun. Lett. 18(11): 1967-1970 (2014) - [j88]Yanxin Yan, Yi Gong, Maode Ma, Qinghua Shi:
Iterative frequency-domain fractionally spaced receiver for zero-padded multi-carrier code division multiple access systems. IET Commun. 8(17): 2993-3000 (2014) - [j87]Mohammad Mehdi Gilanian Sadeghi, Borhanuddin Mohd Ali, Maode Ma, Jamalul-lail Ab Manan:
Scalable and efficient key management for Mobile WiMAX networks. Int. J. Commun. Syst. 27(10): 2166-2189 (2014) - [j86]Lijun Gao, Maode Ma, Yantai Shu, Yuhua Wei:
An ultralightweight RFID authentication protocol with CRC and permutation. J. Netw. Comput. Appl. 41: 37-46 (2014) - [j85]Dong Ma, Maode Ma:
Network selection and resource allocation for multicast in HetNets. J. Netw. Comput. Appl. 43: 17-26 (2014) - [j84]Lin Lin, Shiwei Ma, Maode Ma:
A Group Neighborhood Average Clock Synchronization Protocol for Wireless Sensor Networks. Sensors 14(8): 14744-14764 (2014) - [j83]Jin Cao, Maode Ma, Hui Li:
Access Authentication of Mass Device Connections for MTC in LTE Networks. Smart Comput. Rev. 4(4): 262-277 (2014) - [j82]Mattia Minelli, Maode Ma, Marceau Coupechoux, Jean-Marc Kelif, Marc Sigelle, Philippe Godlewski:
Optimal Relay Placement in Cellular Networks. IEEE Trans. Wirel. Commun. 13(2): 998-1009 (2014) - [j81]Lijun Gao, Maode Ma, Yantai Shu, Feng Lin, Lei Zhang, Yuhua Wei:
A Low-Cost RFID Authentication Protocol Against Desynchronization with a Random Tuple. Wirel. Pers. Commun. 79(3): 1941-1958 (2014) - [j80]Wee-Kiat New, Chee-Onn Chow, Maode Ma:
Resource Management and QoS Provisioning for Duplex Services in IEEE 802.16. Wirel. Pers. Commun. 79(3): 2005-2024 (2014) - [c62]Dong Ma, Maode Ma:
Bandwidth efficient multicast in HetNets. GLOBECOM 2014: 1999-2004 - [c61]Tuo He, Maode Ma, Wenping Ma, Bingsheng He:
A novel authenticated multi-party key agreement for private cloud. ICC 2014: 3776-3781 - [c60]Gen Li, Maode Ma, Chunfeng Liu, Yantai Shu:
Fuzzy Multiple Attribute Decision Routing in VANETs. ICCS 2014: 564-568 - [c59]Li Yu, Xiaopei Li, Peng Zhang, Guangyu Li, Maode Ma:
An improved transport algorithm over DCCP in wireless ad hoc networks. ICCS 2014: 569-573 - [c58]Wee-Kiat New, Chee-Onn Chow, Maode Ma:
Performance measurements for symmetrical services in wireless networks. ISPACS 2014: 312-317 - [c57]Mattia Minelli, Maode Ma, Marceau Coupechoux, Philippe Godlewski:
A geometrical approach for power optimization in relay-based cellular networks. NCC 2014: 1-5 - 2013
- [j79]Ze Wang, Yunlong Wang, Maode Ma, Jigang Wu:
Efficient localization for mobile sensor networks based on constraint rules optimized Monte Carlo method. Comput. Networks 57(14): 2788-2801 (2013) - [j78]Daojing He, Chun Chen, Maode Ma, Sammy Chan, Jiajun Bu:
A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks. Int. J. Commun. Syst. 26(4): 495-504 (2013) - [j77]Chao Lv, Maode Ma, Hui Li, Jianfeng Ma, Yaoyu Zhang:
An novel three-party authenticated key exchange protocol using one-time key. J. Netw. Comput. Appl. 36(1): 498-503 (2013) - [j76]Sandeep Thadvai, Deepnarayan Tiwari, Debasish Jena, Maode Ma:
A novel authenticated encryption scheme with convertibility. Math. Comput. Model. 58(1-2): 178-185 (2013) - [j75]Dong Ma, Maode Ma:
Proactive load balancing with admission control for heterogeneous overlay networks. Wirel. Commun. Mob. Comput. 13(18): 1671-1680 (2013) - [j74]Bin Wang, Maode Ma:
A Smart Card Based Efficient and Secured Multi-Server Authentication Scheme. Wirel. Pers. Commun. 68(2): 361-378 (2013) - [j73]Yi Zhi Zhao, Chunyan Miao, Maode Ma:
An Energy-Efficient Self-Adaptive Duty Cycle MAC Protocol for Traffic-Dynamic Wireless Sensor Networks. Wirel. Pers. Commun. 68(4): 1287-1315 (2013) - [j72]Lijun Gao, Maode Ma, Yantai Shu, Yuhua Wei:
A Security Protocol Resistant to Intermittent Position Trace Attacks and Desynchronization Attacks in RFID Systems. Wirel. Pers. Commun. 68(4): 1943-1959 (2013) - [j71]Mattia Minelli, Marceau Coupechoux, Jean-Marc Kelif, Maode Ma, Philippe Godlewski:
SIR Estimation in Hexagonal Cellular Networks with Best Server Policy. Wirel. Pers. Commun. 69(1): 133-152 (2013) - [j70]Ting Ma, Yee Hui Lee, Maode Ma:
Protecting Satellite Systems from Disassociation DoS Attacks. Wirel. Pers. Commun. 69(2): 623-638 (2013) - [j69]Jinchang Lu, Maode Ma:
A Cross-Layer Cognitive Radio-Based Framework and CAC Scheme in WiMAX Networks. Wirel. Pers. Commun. 71(1): 255-273 (2013) - [c56]Zhenjing Zhang, Maode Ma, Zhigang Jin:
CCS-DTN: Efficient routing in social DTNs based on clustering and network coding. GLOBECOM 2013: 60-64 - [c55]Shuo Chen, Maode Ma:
A dynamic-encryption authentication scheme for M2M security in cyber-physical systems. GLOBECOM 2013: 2897-2901 - [c54]Mattia Minelli, Maode Ma, Jean-Marc Kelif, Marceau Coupechoux, Marc Sigelle:
A fluid approach for performance analysis of LTE-A networks with relays. PIMRC Workshops 2013: 158-162 - [e3]Yuhang Yang, Maode Ma, Baoxiang Liu:
Information Computing and Applications - 4th International Conference, ICICA 2013, Singapore, August 16-18, 2013, Revised Selected Papers, Part I. Communications in Computer and Information Science 391, Springer 2013, ISBN 978-3-642-53931-2 [contents] - [e2]Yuhang Yang, Maode Ma, Baoxiang Liu:
Information Computing and Applications - 4th International Conference, ICICA 2013, Singapore, August 16-18, 2013 Revised Selected Papers, Part II. Communications in Computer and Information Science 392, Springer 2013, ISBN 978-3-642-53702-8 [contents] - 2012
- [j68]Kiam Cheng How, Maode Ma, Yang Qin:
An altruistic differentiated service protocol in dynamic cognitive radio networks against selfish behaviors. Comput. Networks 56(7): 2068-2079 (2012) - [j67]Jin Cao, Hui Li, Maode Ma, Yueyu Zhang, Chengzhe Lai:
A simple and robust handover authentication between HeNB and eNB in LTE networks. Comput. Networks 56(8): 2119-2131 (2012) - [j66]Zheng Liu, Maode Ma, Jufeng Dai:
Utility-based scheduling in wireless multi-hop networks over non-deterministic fading channels. Comput. Networks 56(9): 2304-2315 (2012) - [j65]Ze Wang, Maode Ma, Jigang Wu:
Securing wireless mesh networks in a unified security framework with corruption-resilience. Comput. Networks 56(12): 2981-2993 (2012) - [j64]Yi Zhi Zhao, Chunyan Miao, Maode Ma, Jing-Bing Zhang, Cyril Leung:
A survey and projection on medium access control protocols for wireless sensor networks. ACM Comput. Surv. 45(1): 7:1-7:37 (2012) - [j63]Kiam Cheng How, Maode Ma, Yang Qin:
Differentiated service provisioning in the MAC layer of cognitive radio mesh networks. Int. J. Commun. Networks Distributed Syst. 8(3/4): 213-229 (2012) - [j62]Bing Li, Maode Ma, Zhigang Jin, Dongxue Zhao:
Investigation of a large-scale P2P VoD overlay network by measurements. Peer-to-Peer Netw. Appl. 5(4): 398-411 (2012) - [j61]Daojing He, Chun Chen, Maode Ma, Jiajun Bu:
Cryptanalysis of some conference schemes for mobile communications. Secur. Commun. Networks 5(1): 107-112 (2012) - [j60]Chao Lv, Maode Ma, Hui Li, Jianfeng Ma, Ben Niu:
A security enhanced authentication and key distribution protocol for wireless networks. Secur. Commun. Networks 5(4): 343-352 (2012) - [j59]Chao Lv, Maode Ma, Hui Li, Jianfeng Ma, Ben Niu:
Security enhancement of the communication-efficient AUTHMAC_DH protocols. Secur. Commun. Networks 5(6): 674-680 (2012) - [j58]Bin Wang, Maode Ma:
A Server Independent Authentication Scheme for RFID Systems. IEEE Trans. Ind. Informatics 8(3): 689-696 (2012) - [j57]Dong Ma, Maode Ma:
A QoS Oriented Vertical Handoff Scheme for WiMAX/WLAN Overlay Networks. IEEE Trans. Parallel Distributed Syst. 23(4): 598-606 (2012) - [j56]Thuy Ngoc Nguyen, Maode Ma:
Enhanced EAP-Based Pre-Authentication for Fast and Secure Inter-ASN Handovers in Mobile WiMAX Networks. IEEE Trans. Wirel. Commun. 11(6): 2173-2181 (2012) - [j55]Jin Cao, Maode Ma, Hui Li:
An Uniform Handover Authentication between E-UTRAN and Non-3GPP Access Networks. IEEE Trans. Wirel. Commun. 11(10): 3644-3650 (2012) - [j54]Qi Lu, Maode Ma:
Achieving Faster Handovers in Mobile WiMAX Networks. Wirel. Pers. Commun. 65(1): 165-187 (2012) - [j53]Kiam Cheng How, Maode Ma, Yang Qin:
A MAC-Layer QoS Provisioning Protocol for Cognitive Radio Networks. Wirel. Pers. Commun. 65(1): 203-222 (2012) - [c53]Liqun Zhao, Yang Qin, Maode Ma, Xiaoxiong Zhong, Li Li:
QoS guaranteed resource block allocation algorithm in LTE downlink. CHINACOM 2012: 425-429 - [c52]Jin Cao, Maode Ma, Hui Li:
A group-based authentication and key agreement for MTC in LTE networks. GLOBECOM 2012: 1017-1022 - [c51]Jin Cao, Maode Ma, Hui Li:
Unified handover authentication between heterogeneous access systems in LTE networks. GLOBECOM 2012: 5308-5313 - [c50]Ze Wang, Maode Ma:
A collusion-resilient self-healing key distribution scheme for wireless sensor networks. ICC 2012: 566-570 - [c49]Thuy Ngoc Nguyen, Maode Ma:
An pre-authentication protocol with symmetric keys for secure handover in mobile WiMAX networks. ICC 2012: 863-867 - [c48]Tao Li, Huaqun Guo, Maode Ma:
Hybrid multimedia broadcast encryption schemes. WCNC 2012: 2598-2602 - [e1]Baoxiang Liu, Maode Ma, Jincai Chang:
Information Computing and Applications - Third International Conference, ICICA 2012, Chengde, China, September 14-16, 2012. Proceedings. Lecture Notes in Computer Science 7473, Springer 2012, ISBN 978-3-642-34061-1 [contents] - 2011
- [j52]Kiam Cheng How, Maode Ma, Yang Qin:
Routing and QoS provisioning in cognitive radio networks. Comput. Networks 55(1): 330-342 (2011) - [j51]Jinchang Lu, Maode Ma:
Cognitive radio-based framework and self-optimizing temporal-spectrum block scheduling for QoS provisioning in WiMAX. Comput. Networks 55(6): 1291-1309 (2011) - [j50]Daojing He, Maode Ma, Yan Zhang, Chun Chen, Jiajun Bu:
A strong user authentication scheme with smart cards for wireless communications. Comput. Commun. 34(3): 367-374 (2011) - [j49]Y. Jiao, Maode Ma, Qin Yu, K. Yi, Yan Ma:
Quality of service provisioning in worldwide interoperability for microwave access networks based on cooperative game theory. IET Commun. 5(3): 284-295 (2011) - [j48]Xiaohong Huang, Maode Ma:
A performance model for differentiated service over single-hop passive star coupled WDM optical networks. J. Netw. Comput. Appl. 34(1): 183-193 (2011) - [j47]Xiaohong Huang, Maode Ma:
A heuristic adaptive QoS prediction scheme in single-hop passive star coupled WDM optical networks. J. Netw. Comput. Appl. 34(2): 581-588 (2011) - [j46]Li Yu, Maode Ma, Weidong Hu, Zibo Shi, Yantai Shu:
Design of parameter tunable robust controller for active queue management based on H∞ control theory. J. Netw. Comput. Appl. 34(2): 750-764 (2011) - [j45]Jinchang Lu, Maode Ma:
Cross-layer QoS support framework and holistic opportunistic scheduling for QoS in single carrier WiMAX system. J. Netw. Comput. Appl. 34(2): 765-773 (2011) - [j44]Qi Lu, Maode Ma:
Group mobility support in mobile WiMAX networks. J. Netw. Comput. Appl. 34(4): 1272-1282 (2011) - [j43]Bing Li, Maode Ma, Zhigang Jin:
A VoIP Traffic Identification Scheme Based on Host and Flow Behavior Analysis. J. Netw. Syst. Manag. 19(1): 111-129 (2011) - [j42]Huaqun Guo, Yongdong Wu, Feng Bao, Hongmei Chen, Maode Ma:
UBAPV2G: A Unique Batch Authentication Protocol for Vehicle-to-Grid Communications. IEEE Trans. Smart Grid 2(4): 707-714 (2011) - [j41]Jinchang Lu, Maode Ma:
Cross-Layer MAC Protocol and Holistic Opportunistic Scheduling with Adaptive Power Control for QoS in WiMAX. Wirel. Pers. Commun. 61(1): 19-40 (2011) - [c47]Xue Jun Li, Xuguang Shao, Maode Ma:
Study of effect of timeout settings on energy saving of lighting systems using queuing model. ICICS 2011: 1-5 - [c46]Bin Wang, Maode Ma:
An untraceable and server-independent RFID authentication scheme. ICICS 2011: 1-5 - [c45]Bin Wang, Maode Ma:
An efficient and secured multi-server authentication scheme. ICICS 2011: 1-5 - [c44]Mohammad Mehdi Gilanian Sadeghi, Borhanuddin Mohd Ali, Maode Ma, Jamalul-lail Ab Manan, Nor Kamariah Noordin, Sabira Khatun:
Scalable Rekeying Algorithm in IEEE 802.16e. APCC 2011: 726-730 - [c43]Zhibin Dou, Zenghua Zhao, Quan Jin, Gaotao Shi, Lianfang Zhang, Yantai Shu, Maode Ma:
Understanding link-level characterization of long-distance 802.11g semi-urban links. CHINACOM 2011: 459-464 - [c42]Tao Li, Huaqun Guo, Maode Ma:
Matrix-tree based hybrid broadcast encryption. GLOBECOM Workshops 2011: 61-65 - [c41]Kiam Cheng How, Maode Ma, Yang Qin:
A cross-layer selfishness Avoidance Routing Protocol for the dynamic Cognitive Radio Networks. GLOBECOM Workshops 2011: 942-946 - [c40]Huaqun Guo, Fan Yu, Zonghua Zhang, Wai-Choong Wong, Maode Ma, Yongdong Wu:
HASVC: An Efficient Hybrid Authentication Scheme for Vehicular Communication. ICC 2011: 1-5 - [c39]Ze Wang, Maode Ma, Wenju Liu, Xixi Wei:
A Unified Security Framework for Multi-domain Wireless Mesh Networks. ICICS 2011: 319-329 - [c38]Huaqun Guo, Yongdong Wu, Hongmei Chen, Maode Ma:
A Batch Authentication Protocol for V2G Communications. NTMS 2011: 1-5 - [c37]Yu Ge, Jeng Wai Kwan, Jaya Shankar Pathmasuntharam, Zhengye Di, Terence S. P. See, Wei Ni, Chee Wee Kim, Tat Meng Chiam, Maode Ma:
Performance benchmarking for wireless body area networks at 2.4 GHz. PIMRC 2011: 2249-2253 - [p1]Maode Ma, Chao Lu, Hui Li:
Delay Tolerant Networking. Delay Tolerant Networks 2011: 1-30 - 2010
- [j40]Jinchang Lu, Maode Ma:
A cross-layer elastic CAC and holistic opportunistic scheduling for QoS support in WiMAX. Comput. Networks 54(7): 1155-1168 (2010) - [j39]Yi Zhi Zhao, Maode Ma, Chunyan Miao, T. N. Nguyen:
An energy-efficient and low-latency MAC protocol with Adaptive Scheduling for multi-hop wireless sensor networks. Comput. Commun. 33(12): 1452-1461 (2010) - [j38]Jialing Zheng, Maode Ma:
QoS-aware cooperative medium access control for MIMO ad-hoc networks. IEEE Commun. Lett. 14(1): 48-50 (2010) - [j37]Maode Ma, J. Lu, C. P. Fu:
Hierarchical scheduling framework for QoS service in WiMAX point-to-multi-point networks. IET Commun. 4(9): 1073-1082 (2010) - [j36]Hui Wang, Nazim Agoulmine, Maode Ma, Yanliang Jin:
Network lifetime optimization in wireless sensor networks. IEEE J. Sel. Areas Commun. 28(7): 1127-1137 (2010) - [j35]Cheng Wang, Maode Ma, Rendong Ying, Yuhang Yang:
Narrowband Interference Mitigation in DS-UWB Systems. IEEE Signal Process. Lett. 17(5): 429-432 (2010) - [c36]Kiam Cheng How, Maode Ma, Yang Qin:
An Opportunistic Service Differentiation Routing Protocol for Cognitive Radio Networks. GLOBECOM 2010: 1-5 - [c35]Jinchang Lu, Maode Ma:
Cross-Layer Self-Optimizing Temporal-Spectrum Block Scheduling for QoS Provisioning in WiMAX. GLOBECOM 2010: 1-5 - [c34]Zhenghang Yan, Yilong Lu, Maode Ma, Yuhang Yang:
Decoding of QOSTBC concatenates RS code using parallel interference cancellation. ICDIP 2010: 75463R
2000 – 2009
- 2009
- [j34]Yajun Li, Yuhang Yang, Maode Ma, Liang Zhou:
A hybrid load balancing strategy of sequential tasks for grid computing environments. Future Gener. Comput. Syst. 25(8): 819-828 (2009) - [j33]Huifang Feng, Yantai Shu, Maode Ma:
WLAN Traffic Prediction Using Support Vector Machine. IEICE Trans. Commun. 92-B(9): 2915-2921 (2009) - [j32]Jialing Zheng, Maode Ma:
A utility-based joint power and rate adaptive algorithm in wireless ad hoc networks. IEEE Trans. Commun. 57(1): 134-140 (2009) - [j31]Daojing He, Lin Cui, Hejiao Huang, Maode Ma:
Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 20(7): 1050-1058 (2009) - [j30]Hui Wang, Nazim Agoulmine, Maode Ma, Yajun Li, Xiaomin Wang:
Network Lifetime Optimization by KKT Optimality Conditions in Wireless Sensor Networks. Wirel. Pers. Commun. 49(2): 179-196 (2009) - [j29]Daojing He, Lin Cui, Hejiao Huang, Maode Ma:
Secure and Efficient Localization Scheme in Ultra-Wideband Sensor Networks. Wirel. Pers. Commun. 50(4): 545-561 (2009) - [c33]Dong Ma, Maode Ma:
A QoS-Based Vertical Handoff Scheme for Interworking of WLAN and WiMAX. GLOBECOM 2009: 1-6 - [c32]Yi Zhi Zhao, Thuy Ngoc Nguyen, Maode Ma, Chunyan Miao:
An energy-efficient MAC protocol with Adaptive Scheduling for wireless sensor networks. INDIN 2009: 446-451 - 2008
- [j28]Rongbo Zhu, Jiangqing Wang, Maode Ma:
Intelligent MAC model for traffic scheduling in IEEE 802.11e wireless LANs. Appl. Math. Comput. 205(1): 109-122 (2008) - [j27]Linfang Dong, Yantai Shu, Haiming Chen, Maode Ma:
Packet delay analysis on IEEE 802.11 DCF under finite load traffic in multi-hop ad hoc networks. Sci. China Ser. F Inf. Sci. 51(4): 408-416 (2008) - [j26]Maode Ma, Qichao Zhu:
Providing delay guaranteed service in CDMA wireless networks. Comput. Commun. 31(9): 1785-1795 (2008) - [j25]Maode Ma, Qichao Zhu:
Providing differentiated services in CDMA wireless networks. IET Commun. 2(1): 131-136 (2008) - [j24]Xiaohong Huang, Maode Ma:
Optimal Scheduling for Minimum Delay in Passive Star Coupled WDM Optical Networks. IEEE Trans. Commun. 56(8): 1324-1330 (2008) - [j23]Hui Wang, Yuhang Yang, Maode Ma, Jianhua He, Xiaomin Wang:
Network lifetime maximization with cross-layer design in wireless sensor networks. IEEE Trans. Wirel. Commun. 7(10): 3759-3768 (2008) - [c31]Guixiang Xue, Zheng Zhao, Maode Ma, Tonghua Su, Tianwen Zhang, Shuang Liu:
Task scheduling by Mean Field Annealing algorithm in grid computing. IEEE Congress on Evolutionary Computation 2008: 783-787 - [c30]Jun Xu, Maode Ma, Choi Look Law:
AOA Cooperative Position Localization. GLOBECOM 2008: 3751-3755 - [c29]Ke Zhang, Cheng Peng Fu, Chuan Heng Foh, Maode Ma, Jian Ling Zhang:
Fluid-Based Modeling of TCP Veno. GLOBECOM 2008: 5075-5079 - [c28]Zhenghang Yan, Yilong Lu, Maode Ma, Yuhang Yang:
An iterated channel estimation and tracking scheme for space-time code systems. ICAIT 2008: 38:1-38:4 - [c27]Li Yu, Yantai Shu, Maode Ma, Ming Tang:
An analysis and implementation study on a robust congestion controller for the internet. ICAIT 2008: 42:1-42:6 - [c26]Gaotao Shi, Minghong Liao, Maode Ma, Yantai Shu:
Exploiting sink movement for energy-efficient load-balancing in wireless sensor networks. FOWANC 2008: 39-44 - [c25]Li Yu, Maode Ma:
Experimental evaluation of an adaptive PI rate controller for congestion control. SMC 2008: 1989-1994 - [c24]Lili Zhang, Boon-Hee Soong, Yan Zhang, Maode Ma, Yong Liang Guan:
An Analysis of K-Connectivity in Shadowing and Nakagami Fading Wireless Multi-Hop Networks. VTC Spring 2008: 395-399 - [c23]K. R. Raghu, Sanjay K. Bose, Maode Ma:
A Queue Based Scheduling Approach for WMAN with Adaptive Augmentation. WCNC 2008: 1374-1379 - 2007
- [j22]Mohsen Guizani, Mounir Hamdi, Pascal Lorenz, Maode Ma:
Wireless Broadband Access: WiMAX and Beyond [Guest Editorial]. IEEE Commun. Mag. 45(12): 60-61 (2007) - [j21]Yan Zhang, Yuhang Yang, Maode Ma, Dan Shang, Lin Du:
A Rehearsal-Assisted Distributed MAC Protocol for TDD-CDMA Based Multihop Networks. IEEE Commun. Lett. 11(11): 904-906 (2007) - [j20]Jianxin Chen, Yuhang Yang, Maode Ma, Yong Ouyang:
Performance Study of Packing Aggregation in Wireless Sensor Networks. IEICE Trans. Commun. 90-B(1): 160-163 (2007) - [j19]Tsz Ho Chan, Mounir Hamdi, Chui Ying Cheung, Maode Ma:
A Link Adaptation Algorithm in MIMO-based WiMAX Systems. J. Commun. 2(5): 16-24 (2007) - [j18]Yan Zhang, Maode Ma, Masayuki Fujise:
Call Completion in Wireless Networks Over Lossy Link. IEEE Trans. Veh. Technol. 56(2): 929-941 (2007) - [j17]Maode Ma, Qichao Zhu:
Providing Real-Time Service in CDMA Wireless Networks. Wirel. Pers. Commun. 41(4): 551-562 (2007) - [c22]Jialing Zheng, Maode Ma:
A Utility-Based Joint Power and Rate Adaptive Algorithm for Wireless Ad Hoc Networks. GLOBECOM 2007: 678-682 - [c21]Hui Wang, Yuhang Yang, Maode Ma:
Network Lifetime Global Optimization by Duality Approach in Wireless Sensor Networks. GLOBECOM 2007: 1017-1021 - [c20]Jun Xu, Maode Ma, Choi Look Law:
Theoretical Lower Bound for UWB TDOA Positioning. GLOBECOM 2007: 4101-4105 - [c19]Hui Wang, Yuhang Yang, Maode Ma, Xiaomin Wang:
Network Lifetime Optimization by Duality Approach for Multi-Source and Single-Sink Topology in Wireless Sensor Networks. ICC 2007: 3201-3206 - [c18]Chungui Liu, Yantai Shu, Lianfang Zhang, Maode Ma:
Backup Routing for Multimedia Transmissions over Mesh Networks. ICC 2007: 3829-3834 - [c17]Rongbo Zhu, Maode Ma:
Adaptive Rate Selection Scheme Based on Intelligent Learning Algorithm in Wireless LANs. ISICA 2007: 529-538 - [c16]Ying Wang, Tee Hiang Cheng, Maode Ma:
Priority and Maximum Revenue based Routing and Wavelength Assignment for All-optical WDM Networks. RIVF 2007: 135-139 - 2006
- [j16]Maode Ma, Qichao Zhu:
Providing integrated service in CDMA wireless networks. Comput. Electr. Eng. 32(1-3): 166-177 (2006) - [j15]Yongqing Zhu, Maode Ma, Tee Hiang Cheng:
An efficient solution for mitigating light-load penalty in EPONs. Comput. Electr. Eng. 32(6): 426-431 (2006) - [j14]Yantai Shu, Huifang Feng, Hua Wang, Maode Ma:
Dynamic admission control in hybrid QoS networks with WiFi access. Sci. China Ser. F Inf. Sci. 49(4): 409-420 (2006) - [j13]Yongqing Zhu, Maode Ma, Tee Hiang Cheng:
Hierarchical scheduling to support differentiated services in Ethernet passive optical networks. Comput. Networks 50(3): 350-366 (2006) - [j12]Yan Zhang, Jun Zheng, Lili Zhang, Yifan Chen, Maode Ma:
Modeling location management in wireless networks with generally distributed parameters. Comput. Commun. 29(12): 2386-2395 (2006) - [j11]Maode Ma, Zheng Xiang:
Supporting Real-Time Service in Packet-Switched Wireless Networks. Int. J. Bus. Data Commun. Netw. 2(1): 32-43 (2006) - [j10]Maode Ma, Shin Yeh Low:
Adaptive polling interval scheduling to support real-time service in Bluetooth networks. Int. J. Wirel. Mob. Comput. 1(3/4): 204-210 (2006) - [j9]Yongqing Zhu, Maode Ma:
Supporting Differentiated Services with Fairness by an Urgency Fair Queuing Scheduling Scheme in EPONs. Photonic Netw. Commun. 12(1): 99-110 (2006) - [c15]Guixiang Xue, Zheng Zhao, Maode Ma, Yantai Shu:
Task Scheduling by Neural Network with Mean Field Annealing Improvement in Grid Computing. CCECE 2006: 554-557 - [c14]Maode Ma, Jialing Zheng, Yan Zhang, Zhenhai Shao, Masayuki Fujise:
A Power-Controlled Rate-Adaptive MAC Protocol to Support Differentiated Service in Wireless Ad Hoc Networks. GLOBECOM 2006 - [c13]Huifang Feng, Yantai Shu, Shuyi Wang, Maode Ma:
SVM-Based Models for Predicting WLAN Traffic. ICC 2006: 597-602 - [c12]Ashok Sunder Rajan, Maode Ma:
Ubiquitous Mobility in Next Generation Networks. ICON 2006: 1-5 - 2005
- [j8]Xiaohong Huang, Maode Ma:
Message scheduling in WDM optical networks with reduced transmitter tuning overhead. IEEE Commun. Lett. 9(1): 72-74 (2005) - [c11]Yongqing Zhu, Maode Ma, Tee Hiang Cheng:
An urgency fair queuing scheduling to support differentiated services in EPONs. GLOBECOM 2005: 5 - 2004
- [j7]Maode Ma, Xiaohong Huang:
Adaptive scheduling for integrated traffic on WDM optical networks. Comput. Networks 44(6): 773-788 (2004) - [j6]Maode Ma, Mounir Hamdi:
An adaptive scheduling algorithm for differentiated services on WDM optical networks. Comput. Commun. 27(9): 857-867 (2004) - [j5]Xiaohong Huang, Maode Ma:
Efficient message scheduling for WDM optical networks with minimizing flow time. J. Commun. Networks 6(2): 147-155 (2004) - [c10]Xiaohong Huang, Maode Ma:
Message scheduling in WDM optical networks with reduced transmitter tuning overhead. ICC 2004: 1674-1678 - [c9]Xiaohong Huang, Maode Ma:
An efficient scheduling algorithm with reduced message delay for WDM optical networks. ICON 2004: 132-136 - [c8]Yongqing Zhu, Maode Ma, Tee Hiang Cheng:
An efficient multiple access control scheme to support differentiated services in EPONS. ICON 2004: 147-151 - 2003
- [j4]Maode Ma:
A cost-based scheduling algorithm for differentiated service on WDM optical networks. IEEE Commun. Lett. 7(9): 460-462 (2003) - [c7]Yongqing Zhu, Maode Ma, Tee Hiang Cheng:
A novel multiple access scheme for Ethernet passive optical networks. GLOBECOM 2003: 2649-2653 - [c6]Maode Ma:
A Bandwidth Guaranteed Polling MAC Protocol for Ethernet Passive Optical Networks. INFOCOM 2003: 22-31 - 2001
- [c5]Maode Ma, Mounir Hamdi:
An adaptive scheduling algorithm for differentiated services on WDM optical networks. GLOBECOM 2001: 1455-1459 - 2000
- [j3]Maode Ma, Mounir Hamdi:
Providing deterministic quality-of-service guarantees on WDM optical networks. IEEE J. Sel. Areas Commun. 18(10): 2072-2083 (2000) - [c4]Maode Ma, Mounir Hamdi:
Providing guaranteed deterministic performance service to multimedia applications on WDM optical networks. GLOBECOM 2000: 1171-1175 - [c3]Maode Ma, Mounir Hamdi:
A Systematic Scheme for Guaranteed Deterministic Performance Service on WDM Optical Networks. ICC (3) 2000: 1277-1281
1990 – 1999
- 1999
- [j2]Maode Ma, Babak Hamidzadeh, Mounir Hamdi:
An Efficient Message Scheduling Algorithm for WDM Lightwave Networks. Comput. Networks 31(20): 2139-2152 (1999) - [j1]Maode Ma, Babak Hamidzadeh, Mounir Hamdi:
Efficient Scheduling Algorithms for Real-Time Service on WDM Optical Networks. Photonic Netw. Commun. 1(2): 161-178 (1999) - 1998
- [c2]Maode Ma, Babak Hamidzadeh, Mounir Hamdi:
Efficient Scheduling Algorithms for Real-Time Service on WDM Optical Networks. ICCCN 1998: 486-493 - 1996
- [c1]Maode Ma, Babak Hamidzadeh:
A Fault-tolerant Strategy for Real-time Task Scheduling on Multiprocessor System. ISPAN 1996: 544-546
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint